Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-11-02Palo Alto Networks Unit 42Jacob Soo, Josh Grunzweig
Recent InPage Exploits Lead to Multiple Malware Families
Confucius
2017-11-02TalosEarl Carter, Edmund Brumaghin, Emmanuel Tacheau
Poisoning the Well: Banking Trojan Targets Google Search Results
PandaBanker
2017-11-02Palo Alto Networks Unit 42Jacob Soo, Josh Grunzweig
Recent InPage Exploits Lead to Multiple Malware Families
BioData
2017-11-01Virus BulletinPatrick Wardle
Offensive malware analysis: dissecting OSX/FruitFly.B via a custom C&C server
FruitFly
2017-11-01Bleeping ComputerCatalin Cimpanu
CryptoShuffler Stole $150,000 by Replacing Bitcoin Wallet IDs in PC Clipboards
CryptoShuffler
2017-11-01Palo Alto Networks Unit 42Brandon Levene, Brandon Young, Dominik Reichel
Everybody Gets One: QtBot Used to Distribute Trickbot and Locky
QtBot
2017-11-01Kaspersky LabsGReAT
Silence – a new Trojan attacking financial organizations
Silence Silence group
2017-11-01IntezerJay Rosenberg
Silence of the Moles
Silence
2017-10-31McAfeeXiaobing Lin
Expiro Malware Is Back and Even Harder to Remove
Expiro
2017-10-31MalwarebytesPieter Arntz
Analyzing malware by API calls
Vflooder
2017-10-31Bleeping ComputerLawrence Abrams
ONI Ransomware Used in Month-Long Attacks Against Japanese Companies
Oni
2017-10-30Trend MicroJason Gu, Seven Shen, Veo Zhang
Coin Miner Mobile Malware Returns, Hits Google Play
Cpuminer
2017-10-30Kaspersky LabsGhareeb Saad, Mohamad Amin Hasbini
Gaza Cybergang – updated activity in 2017:
Molerats
2017-10-30ESET ResearchFrédéric Vachon
Windigo Still not Windigone: An Ebury Update
Ebury
2017-10-29quangnh89
Sality Configuration Extractor (sality_extractor.py)
Sality
2017-10-27Palo Alto Networks Unit 42Unit42
Tracking Subaat: Targeted Phishing Attack Leads to Threat Actor’s Repository
The Gorgon Group
2017-10-27Independent.co.ukAdam Withnall
British security minister says North Korea was behind WannaCry hack on NHS
WannaCryptor
2017-10-27F-SecureF-Secure Global
The big difference with Bad Rabbit
EternalPetya
2017-10-27BellingcatCollin Anderson
Bahamut Revisited, More Cyber Espionage in the Middle East and South Asia
Bahamut Bahamut Bahamut
2017-10-27Palo Alto Networks Unit 42Unit 42
Tracking Subaat: Targeted Phishing Attack Leads to Threat Actor’s Repository